Detecting information-hiding in WAV audios

In this article, we propose a steganalysis method for detecting the presence of information-hiding behavior in wav audios. We extract the neighboring joint distribution features and the Markov features of the second order derivative, and combine these features with the error response by randomly modifying the least significant bit, then apply learning machines to the features for distinguishing the stegoaudios from cover videos. Experimental results show that our method performs well in steganalysis of the audio stegograms that are produced by using Hide4PGP, Invisible Secrets and S-tools4.

[1]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[2]  Ismail Avcibas Audio steganalysis with content-independent distortion measures , 2006, IEEE Signal Processing Letters.

[3]  Nasir D. Memon,et al.  Detection of audio covert channels using statistical footprints of hidden messages , 2006, Digit. Signal Process..

[4]  John Ignatius Griffin,et al.  Statistics; methods and applications , 1963 .

[5]  Qingzhong Liu,et al.  Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images , 2007, IJCAI.

[6]  Fei Wu,et al.  Audio steganalysis based on “negative resonance phenomenon” caused by steganographic tools , 2006 .

[7]  Qingzhong Liu,et al.  Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..

[8]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[9]  Jana Dittmann,et al.  Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification , 2007, Information Hiding.

[10]  Qingzhong Liu,et al.  Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[11]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[12]  Qingzhong Liu,et al.  Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[13]  Hong-Juan Zhang,et al.  Steganalysis of audio: attacking the Steghide , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[14]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[15]  Qingzhong Liu,et al.  Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..

[16]  John Hallam,et al.  IEEE International Joint Conference on Neural Networks , 2005 .

[17]  Wu Fei,et al.  Audio steganalysis based on “negative resonance phenomenon” caused by steganographic tools , 2006 .

[18]  Siwei Lyu,et al.  How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.

[19]  Siwei Lyu,et al.  Steganalysis of recorded speech , 2005, IS&T/SPIE Electronic Imaging.

[20]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[21]  Jana Dittmann,et al.  Mel-cepstrum-based steganalysis for VoIP steganography , 2007, Electronic Imaging.